APPROVED SSH SECURITY ALGORITHMS

Georgia SoftWorks 2019

Advancements in mathematics and computing power forced deprecation of many existing and commonly used security algorithms an d ciphers Modern SAFE algorithms have replaced the deprecated ones. Unfortunately, most SSH products do not have updated algorithms th at are SAFE for 2019 Both the SSH Server and Client must use SAFE, approved algorithms, MACs and ciphers to provide the level of security for whic h SSH is renowned

Categories

SSH includes several categories of security algorithms that are responsible for securing different aspects of the protocol

Host Key Algorithms

Key Exchange Algorithms

Message Authentication Codes (MACs)

CIPHERS

Public Key Algorithms

Purpose

Each category has specific purposes during various stages of the protocol operation

Server authenticates itself to the client.Used by the client to verify that they are connecting to the correct hos

Used to derive encryption keys and initialization vectors used by ciphers and MAC’s

Used to protect data integrity and prevent replay attacks

PrivacyAlgorithms performing encryption/decryption of the data being transferred

Client authenticates itself to the server. Proves to the Host that the client is who they say they are

Protect Against

Each algorithm category protects againstdifferent threats. There is some overlap where needed